First published: Tue Mar 12 2024(Updated: )
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.0.1<=20.1.0 | |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.2.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.1.0<=8.3.0 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-2193 is considered a high-severity vulnerability due to its potential for unauthorized data disclosure.
To mitigate CVE-2024-2193, apply the latest security patches provided by F5 for affected products.
CVE-2024-2193 impacts several F5 products including BIG-IP Next, BIG-IP, BIG-IQ Centralized Management, and F5OS.
CVE-2024-2193 can be exploited by unauthenticated attackers using speculative execution techniques to access sensitive data.
Check the version of your F5 products against the specified vulnerable ranges for CVE-2024-2193 to determine if your system is at risk.